/cons/2600/HOPE Number Nine (2012)/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
HOPE Number Nine (2012) Kill the Internet.mp444.8 MiB2015-Sep-14 22:33
HOPE Number Nine (2012) Kill the Internet.srt83.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) No Natural Resources Were Hurt Assembling This Sofa.mp447.8 MiB2015-Sep-14 22:35
HOPE Number Nine (2012) No Natural Resources Were Hurt Assembling This Sofa.srt67.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) 3D Printing Making Friends in DC Before People Start Freaking Out.mp433.2 MiB2015-Sep-14 22:36
HOPE Number Nine (2012) 3D Printing Making Friends in DC Before People Start Freaking Out.srt64.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Activist DDoS Attacks When Analogies and Metaphors Fail.mp451.6 MiB2015-Sep-14 22:38
HOPE Number Nine (2012) Activist DDoS Attacks When Analogies and Metaphors Fail.srt88.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Advanced Handcuff Hacking.mp443.7 MiB2015-Sep-14 22:39
HOPE Number Nine (2012) Advanced Handcuff Hacking.srt82.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Advancements in Botnet Attacks and Malware Distribution.mp452.7 MiB2015-Sep-14 22:41
HOPE Number Nine (2012) Advancements in Botnet Attacks and Malware Distribution.srt85.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) An Aesthetic Critique of Fictional Media.mp426.5 MiB2015-Sep-14 22:42
HOPE Number Nine (2012) An Aesthetic Critique of Fictional Media.srt52.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape.mp447.8 MiB2015-Sep-14 22:44
HOPE Number Nine (2012) Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape.srt78.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Brain Chemistry How Psychoactive Chemicals Hack Central Nervous System.mp449.2 MiB2015-Sep-14 22:45
HOPE Number Nine (2012) Brain Chemistry How Psychoactive Chemicals Hack Central Nervous System.srt66.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Building Radios to Talk to the Dead.mp432.4 MiB2015-Sep-14 22:46
HOPE Number Nine (2012) Building Radios to Talk to the Dead.srt46.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Cell Site Location Data & Nontrespassory Surveillance after U.S. v. Jones.mp447.6 MiB2015-Sep-14 22:48
HOPE Number Nine (2012) Cell Site Location Data & Nontrespassory Surveillance after U.S. v. Jones.srt82.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Closing Ceremonies.mp453.0 MiB2015-Sep-14 22:49
HOPE Number Nine (2012) Closing Ceremonies.srt77.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Combat Robots Then and Now.mp446.8 MiB2015-Sep-14 22:50
HOPE Number Nine (2012) Combat Robots Then and Now.srt79.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Community Fabrication Four Years Later.mp448.6 MiB2015-Sep-14 22:52
HOPE Number Nine (2012) Community Fabrication Four Years Later.srt90.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Computer Forensics Possibility, Probability, Opinion, and Fact.mp452.7 MiB2015-Sep-14 22:54
HOPE Number Nine (2012) Computer Forensics Possibility, Probability, Opinion, and Fact.srt86.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Countermeasures Proactive Self Defense Against Ubiquitous Surveillance.mp448.5 MiB2015-Sep-14 22:55
HOPE Number Nine (2012) Countermeasures Proactive Self Defense Against Ubiquitous Surveillance.srt79.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Crimeware Tools and Techniques of 2012 Past, Present, and Future.mp444.5 MiB2015-Sep-14 22:57
HOPE Number Nine (2012) Crimeware Tools and Techniques of 2012 Past, Present, and Future.srt72.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Cryptome Tracks the NYPD Ring of Steel.mp439.6 MiB2015-Sep-14 22:57
HOPE Number Nine (2012) Cryptome Tracks the NYPD Ring of Steel.srt61.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) DARPA Funding for Hackers, Hackerspaces, and Education A Good Thing.mp461.5 MiB2015-Sep-14 22:59
HOPE Number Nine (2012) DARPA Funding for Hackers, Hackerspaces, and Education A Good Thing.srt86.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) DKIM You re Doing It Wrong.mp446.0 MiB2015-Sep-14 23:09
HOPE Number Nine (2012) DKIM You re Doing It Wrong.srt51.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) DUI DWI Testing - A Hacker s View of the Technology and Process.mp450.4 MiB2015-Sep-14 23:10
HOPE Number Nine (2012) DUI DWI Testing - A Hacker s View of the Technology and Process.srt79.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Dead in a Pool of Blood and Millions of Dollars of Net Art.mp446.2 MiB2015-Sep-14 23:01
HOPE Number Nine (2012) Dead in a Pool of Blood and Millions of Dollars of Net Art.srt75.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Declassifying Government and Undermining a Culture of Insecurity.mp450.4 MiB2015-Sep-14 23:02
HOPE Number Nine (2012) Declassifying Government and Undermining a Culture of Insecurity.srt67.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Designing Free Hardware Scratching Your Own Itch with a Soldering Iron.mp450.8 MiB2015-Sep-14 23:04
HOPE Number Nine (2012) Designing Free Hardware Scratching Your Own Itch with a Soldering Iron.srt82.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Destroying Evidence Before It s Evidence.mp448.8 MiB2015-Sep-14 23:06
HOPE Number Nine (2012) Destroying Evidence Before It s Evidence.srt83.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Digital Security in Health Care Institutions.mp448.9 MiB2015-Sep-14 23:07
HOPE Number Nine (2012) Digital Security in Health Care Institutions.srt73.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Electric Bodies and Possible Worlds.mp474.5 MiB2015-Sep-14 23:12
HOPE Number Nine (2012) Electric Bodies and Possible Worlds.srt120.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Exploiting ZigBee and the Internet of Things.mp447.4 MiB2015-Sep-14 23:14
HOPE Number Nine (2012) Exploiting ZigBee and the Internet of Things.srt74.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Explosive Steganography.mp435.2 MiB2015-Sep-14 23:15
HOPE Number Nine (2012) Explosive Steganography.srt59.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Friday Keynote - William Binney.mp480.5 MiB2015-Sep-14 23:18
HOPE Number Nine (2012) Friday Keynote - William Binney.srt127.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Geeks and Depression.mp480.3 MiB2015-Sep-14 23:20
HOPE Number Nine (2012) Geeks and Depression.srt124.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) HIDIOUS Methods of Keystroke Injection.mp450.9 MiB2015-Sep-14 23:29
HOPE Number Nine (2012) HIDIOUS Methods of Keystroke Injection.srt80.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hack the Law.mp477.6 MiB2015-Sep-14 23:21
HOPE Number Nine (2012) Hackers and Media Hype or Big Hacks That Never Really Happened.mp441.2 MiB2015-Sep-14 23:23
HOPE Number Nine (2012) Hackers and Media Hype or Big Hacks That Never Really Happened.srt82.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hacking Mindsets Conceptual Approaches.mp447.4 MiB2015-Sep-14 23:24
HOPE Number Nine (2012) Hacking Mindsets Conceptual Approaches.srt68.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hacking the Cosmos via Crowdsourced Particle Astronomy.mp437.8 MiB2015-Sep-14 23:25
HOPE Number Nine (2012) Hacking the Cosmos via Crowdsourced Particle Astronomy.srt67.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hacking the Spaces.mp450.4 MiB2015-Sep-14 23:27
HOPE Number Nine (2012) Hacking the Spaces.srt85.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hacktivism, Tools, and the Arab Spring.mp449.7 MiB2015-Sep-14 23:28
HOPE Number Nine (2012) Hacktivism, Tools, and the Arab Spring.srt65.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Historic Hacks in Portable Computing.mp451.7 MiB2015-Sep-14 23:31
HOPE Number Nine (2012) Historic Hacks in Portable Computing.srt83.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Hosting irc.2600.net - My Life with the Thrill Kill Cult.mp444.2 MiB2015-Sep-14 23:32
HOPE Number Nine (2012) Hosting irc.2600.net - My Life with the Thrill Kill Cult.srt70.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) How to Communicate with Your Car s Network.mp451.6 MiB2015-Sep-14 23:34
HOPE Number Nine (2012) How to Communicate with Your Car s Network.srt89.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) How to Retrofit the First Law of Robotics.mp452.6 MiB2015-Sep-14 23:35
HOPE Number Nine (2012) How to Retrofit the First Law of Robotics.srt72.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) I m Not a Real Friend, But I Play One on the Internet.mp438.8 MiB2015-Sep-14 23:36
HOPE Number Nine (2012) I m Not a Real Friend, But I Play One on the Internet.srt91.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) ICANN s New gTLD Program Implications on Security, Stability, Governance.mp452.6 MiB2015-Sep-14 23:38
HOPE Number Nine (2012) ICANN s New gTLD Program Implications on Security, Stability, Governance.srt89.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) IPv6 Now! What Does This Mean.mp447.9 MiB2015-Sep-14 23:42
HOPE Number Nine (2012) IPv6 Now! What Does This Mean.srt77.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Information Distribution in the Arab Spring - No Hacks Required.mp434.7 MiB2015-Sep-14 23:39
HOPE Number Nine (2012) Information Distribution in the Arab Spring - No Hacks Required.srt61.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Infrastructure Mediated Sensing of Whole-Home Human Activity.mp449.1 MiB2015-Sep-14 23:40
HOPE Number Nine (2012) Infrastructure Mediated Sensing of Whole-Home Human Activity.srt81.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Jason Scott s Strange and Wonderful Digital History Argosy.mp447.3 MiB2015-Sep-14 23:43
HOPE Number Nine (2012) Jason Scott s Strange and Wonderful Digital History Argosy.srt76.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Keynote Address - The Yes Men.mp467.0 MiB2015-Sep-14 23:45
HOPE Number Nine (2012) Keynote Address - The Yes Men.srt96.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Legal Processes As Infrastructure Attacks.mp451.8 MiB2015-Sep-14 23:46
HOPE Number Nine (2012) Legal Processes As Infrastructure Attacks.srt79.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Lightning Talks.mp446.5 MiB2015-Sep-14 23:48
HOPE Number Nine (2012) Make Your Laws Practical Liquid Democracy.mp461.7 MiB2015-Sep-14 23:49
HOPE Number Nine (2012) Make Your Laws Practical Liquid Democracy.srt80.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Manufacturing Modern Computer Chips.mp446.5 MiB2015-Sep-14 23:50
HOPE Number Nine (2012) Manufacturing Modern Computer Chips.srt90.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Mastering Master-Keyed Systems.mp441.9 MiB2015-Sep-14 23:52
HOPE Number Nine (2012) Mastering Master-Keyed Systems.srt86.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Messing with Nmap Through Smoke and Mirrors.mp445.1 MiB2015-Sep-14 23:53
HOPE Number Nine (2012) Messing with Nmap Through Smoke and Mirrors.srt77.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Nymwars Fighting for Anonymity and Pseudonymity on the Internet.mp445.7 MiB2015-Sep-14 23:54
HOPE Number Nine (2012) Nymwars Fighting for Anonymity and Pseudonymity on the Internet.srt70.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Occupy the Airwaves Tools to Empower Community Radio Stations.mp446.0 MiB2015-Sep-14 23:55
HOPE Number Nine (2012) Occupy the Airwaves Tools to Empower Community Radio Stations.srt73.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Old School Phreaking.mp448.7 MiB2015-Sep-14 23:57
HOPE Number Nine (2012) Old School Phreaking.srt72.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Patents How to Get Them and How to Beat Them.mp454.0 MiB2015-Sep-14 23:58
HOPE Number Nine (2012) Patents How to Get Them and How to Beat Them.srt77.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Phone Phreak Confidential The Backstory of the History of Phone Phreaking.mp448.9 MiB2015-Sep-14 23:59
HOPE Number Nine (2012) Phone Phreak Confidential The Backstory of the History of Phone Phreaking.srt86.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Practical Insecurity in Encrypted Radio.mp450.6 MiB2015-Sep-15 00:01
HOPE Number Nine (2012) Practical Insecurity in Encrypted Radio.srt83.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Printable Electronics and the Future of Open Hardware.mp444.0 MiB2015-Sep-15 00:02
HOPE Number Nine (2012) Printable Electronics and the Future of Open Hardware.srt54.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Privacy - A Postmortem (1 of 2).mp484.0 MiB2015-Sep-15 00:04
HOPE Number Nine (2012) Privacy - A Postmortem (1 of 2).srt123.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Privacy - A Postmortem (2 of 2).mp463.7 MiB2015-Sep-15 00:06
HOPE Number Nine (2012) Privacy - A Postmortem (2 of 2).srt115.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Privacy Tricks for Activist Web Developers.mp451.7 MiB2015-Sep-15 00:09
HOPE Number Nine (2012) Privacy Tricks for Activist Web Developers.srt68.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Privacy by Design - a Dream for a Telecommunications Provider.mp450.0 MiB2015-Sep-15 00:08
HOPE Number Nine (2012) Privacy by Design - a Dream for a Telecommunications Provider.srt81.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Project Byzantium Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse.mp448.7 MiB2015-Sep-15 00:11
HOPE Number Nine (2012) Project Byzantium Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse.srt81.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Protecting Your Data from the Cops.mp442.2 MiB2015-Sep-15 00:12
HOPE Number Nine (2012) Protecting Your Data from the Cops.srt85.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Pwn the Drones A Survey of UAV Hacks and Exploits.mp448.2 MiB2015-Sep-15 00:13
HOPE Number Nine (2012) Pwn the Drones A Survey of UAV Hacks and Exploits.srt82.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Re-wired Hacking the Auditory Experience.mp430.4 MiB2015-Sep-15 00:14
HOPE Number Nine (2012) Re-wired Hacking the Auditory Experience.srt37.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Real Advances in Android Malware.mp416.1 MiB2015-Sep-15 00:15
HOPE Number Nine (2012) Real Advances in Android Malware.srt34.0 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Recent Advances in Single Packet Authorization.mp437.4 MiB2015-Sep-15 00:16
HOPE Number Nine (2012) Recent Advances in Single Packet Authorization.srt67.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) SCADA PLC Exploitation and Disclosure.mp446.5 MiB2015-Sep-15 00:17
HOPE Number Nine (2012) SCADA PLC Exploitation and Disclosure.srt82.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Sierra Zulu - How to Create a Feature Film About the Digital Age.mp429.7 MiB2015-Sep-15 00:18
HOPE Number Nine (2012) Sierra Zulu - How to Create a Feature Film About the Digital Age.srt44.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Social Engineering.mp463.4 MiB2015-Sep-15 00:20
HOPE Number Nine (2012) Social Engineering.srt86.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Solving More Than #firstworldproblems.mp443.1 MiB2015-Sep-15 00:21
HOPE Number Nine (2012) Solving More Than #firstworldproblems.srt65.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Spy Improv Reality Unfiltered.mp4111.5 MiB2015-Sep-15 00:24
HOPE Number Nine (2012) Taking a Bite Out of Logs with Sagan.mp433.9 MiB2015-Sep-15 00:25
HOPE Number Nine (2012) Taking a Bite Out of Logs with Sagan.srt70.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Technology to Change Society What Not to Do.mp450.7 MiB2015-Sep-15 00:26
HOPE Number Nine (2012) Technology to Change Society What Not to Do.srt87.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Testing the Two Party Tyranny and Open Source Everything.mp452.6 MiB2015-Sep-15 00:28
HOPE Number Nine (2012) Testing the Two Party Tyranny and Open Source Everything.srt83.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The ARRIStocrats Cable Modem Lulz.mp440.0 MiB2015-Sep-15 00:29
HOPE Number Nine (2012) The ARRIStocrats Cable Modem Lulz.srt45.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Autism Spectrum and You.mp450.6 MiB2015-Sep-15 00:30
HOPE Number Nine (2012) The Autism Spectrum and You.srt87.1 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Emergence of Hacker as Artist and Artist as Hacker.mp458.0 MiB2015-Sep-15 00:32
HOPE Number Nine (2012) The Emergence of Hacker as Artist and Artist as Hacker.srt85.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Internet is for Porn! Internet Innovation and Information Security.mp447.3 MiB2015-Sep-15 00:33
HOPE Number Nine (2012) The Internet is for Porn! Internet Innovation and Information Security.srt69.7 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Open Secure Telephony Network.mp450.7 MiB2015-Sep-15 00:34
HOPE Number Nine (2012) The Open Secure Telephony Network.srt83.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Original WWII Hackers.mp440.8 MiB2015-Sep-15 00:35
HOPE Number Nine (2012) The Original WWII Hackers.srt48.3 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Smartphone Penetration Testing Framework.mp446.0 MiB2015-Sep-15 00:36
HOPE Number Nine (2012) The Smartphone Penetration Testing Framework.srt73.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The State of HTTPS.mp456.2 MiB2015-Sep-15 00:38
HOPE Number Nine (2012) The State of HTTPS.srt94.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The State of Open Source Hardware.mp445.2 MiB2015-Sep-15 00:39
HOPE Number Nine (2012) The State of Open Source Hardware.srt75.4 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) The Weather is Not Boring! Forecasting, Following, and Photographing Storms.mp454.2 MiB2015-Sep-15 00:40
HOPE Number Nine (2012) Twitter Revolution Meets Surveillance State Now What.mp449.5 MiB2015-Sep-15 00:41
HOPE Number Nine (2012) Twitter Revolution Meets Surveillance State Now What.srt79.9 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Using Browser-based Tools to Open Up the Web.mp437.8 MiB2015-Sep-15 00:44
HOPE Number Nine (2012) Using Browser-based Tools to Open Up the Web.srt60.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Using a Space Camp Model for Next Generation Security Training.mp446.9 MiB2015-Sep-15 00:43
HOPE Number Nine (2012) Using a Space Camp Model for Next Generation Security Training.srt74.8 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) We Will Be Legion Decentralizing the Web.mp449.2 MiB2015-Sep-15 00:45
HOPE Number Nine (2012) We Will Be Legion Decentralizing the Web.srt68.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) When the Founder is Gone Longevity for Open Projects.mp451.3 MiB2015-Sep-15 00:46
HOPE Number Nine (2012) When the Founder is Gone Longevity for Open Projects.srt95.2 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Why Browser Cryptography is Bad and How We Can Make It Great.mp445.2 MiB2015-Sep-15 00:47
HOPE Number Nine (2012) Why Browser Cryptography is Bad and How We Can Make It Great.srt69.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Why Names Matter How Online Identity is Defining the Future of the Net.mp441.3 MiB2015-Sep-15 00:48
HOPE Number Nine (2012) Why Names Matter How Online Identity is Defining the Future of the Net.srt92.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Why You Shouldn t Write Off Higher Education, Young Grasshopper.mp449.9 MiB2015-Sep-15 00:50
HOPE Number Nine (2012) Why You Shouldn t Write Off Higher Education, Young Grasshopper.srt95.5 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) WikiLeaks, Whistleblowers, and the War on the First Amendment.mp450.5 MiB2015-Sep-15 00:51
HOPE Number Nine (2012) WikiLeaks, Whistleblowers, and the War on the First Amendment.srt80.6 KiB2015-Feb-13 12:32
HOPE Number Nine (2012) Your Cell Phone is Covered in Spiders! Overview of Mobile Device Security.mp446.7 MiB2015-Sep-15 00:53
HOPE Number Nine (2012) Your Cell Phone is Covered in Spiders! Overview of Mobile Device Security.srt73.9 KiB2015-Feb-13 12:32